SlideShare une entreprise Scribd logo
1  sur  25
Télécharger pour lire hors ligne
SECURITY ISSUES OF IOT WITH FOG.
Achu Anna Antony
S1 M.Tech CSE
Roll No: 01
Guide: Mr.Bino Thomas
Assistant Professor, CSE
November 9, 2016
Achu Anna Antony S1 M.Tech CSE Roll No: 01 Guide: Mr.Bino Thomas Assistant Professor, CSESECURITY ISSUES OF IOT WITH FOG. 1 / 25
OUTLINE
Introduction
Existing System
Problem Statement
Proposed System
Conclusion
Future Works
References
Achu Anna Antony S1 M.Tech CSE Roll No: 01 Guide: Mr.Bino Thomas Assistant Professor, CSESECURITY ISSUES OF IOT WITH FOG. 2 / 25
INTRODUCTION
Cloud: Storing and accessing data and programs over the
Internet instead of computer’s hard drive.
IoT : Everyday objects(IoT nodes) connected through
Internet, allowing them to send and receive data
IoT uses:
Internet : Infrastructure to interconnect IoT nodes
Cloud: Background supporting infrastructure
Achu Anna Antony S1 M.Tech CSE Roll No: 01 Guide: Mr.Bino Thomas Assistant Professor, CSESECURITY ISSUES OF IOT WITH FOG. 3 / 25
INTRODUCTION contd...
Huge network latency and Backend overhead occurs as data
to be processed increases in IoT cloud. So IoT uses,
Fog as a solution : ie.. intermediate computing buffer between
IoT nodes and Cloud
Adoption of IoT fog can cause many security threats, which is
explored throughout
Achu Anna Antony S1 M.Tech CSE Roll No: 01 Guide: Mr.Bino Thomas Assistant Professor, CSESECURITY ISSUES OF IOT WITH FOG. 4 / 25
EXISTING SYSTEM
Title:- ”Fog Computing and Its Role in the Internet of Things”
(F.Bonomi, R. Milito, J. Zhu, and S. Addepalli)
Proposed:
Fog Computing - Extension of cloud computing Features used
Features:
Highly virtualized platform
Limitations
Multi fog OS prevents from access of other OS. If there occur
any problem on Kernel mode, it does not prevent.
Figure: Fog with computing features
Achu Anna Antony S1 M.Tech CSE Roll No: 01 Guide: Mr.Bino Thomas Assistant Professor, CSESECURITY ISSUES OF IOT WITH FOG. 5 / 25
EXISTING SYSTEM contd...
Title:-”The Fog Computing Paradigm: Scenarios and Security
Issues” (I. Stojmenovic and W. Sheng)
Proposed:
Man in the middle attack- Fog devices get replaced by fake
ones.
Features:
Intrusion Detection method signature, behavioural or anomaly
based detection method
Limitations
Protection methods like encryption and decryption of data
consume large amount of battery on mobile devices.
Achu Anna Antony S1 M.Tech CSE Roll No: 01 Guide: Mr.Bino Thomas Assistant Professor, CSESECURITY ISSUES OF IOT WITH FOG. 6 / 25
EXISTING SYSTEM contd...
Title:- Semantics-Aware Android Malware Classification Using
Weighted Contextual API Dependency Graphs (M. Zhang, Y.
Duan, H. Yun, and Z.Zhao)
Proposed:
Android based malware detection
Features:
Uses Signature based approach for detection of malware
Graphs are generated from behaviour graphs and convert it to
signature and stores in database.
Limitations
Detection of malware from unknown or new malware family
will be hectic.
Figure: Android based malware to signature conversion[4]
Achu Anna Antony S1 M.Tech CSE Roll No: 01 Guide: Mr.Bino Thomas Assistant Professor, CSESECURITY ISSUES OF IOT WITH FOG. 7 / 25
FOG COMPUTING
Fog computing is an extension of cloud computing paradigm,
but is a more highly virtualized platform that provides
computation, storage, and networking services between end
IoT devices and back-end cloud servers.
Figure: The hierarchical fog computing architecture
Achu Anna Antony S1 M.Tech CSE Roll No: 01 Guide: Mr.Bino Thomas Assistant Professor, CSESECURITY ISSUES OF IOT WITH FOG. 8 / 25
ADVANTAGES AND APPLICATIONS OF FOG
Advantages
Greater business agility
Low latency
Geo distribution
Lower operating expense
Applications
Geographically distributed applications
Fast mobile applications
Large-scale distributed control systems
Achu Anna Antony S1 M.Tech CSE Roll No: 01 Guide: Mr.Bino Thomas Assistant Professor, CSESECURITY ISSUES OF IOT WITH FOG. 9 / 25
PROBLEM STATEMENT
As fog infrastructure is prone to many security threats, there
is a need for studying about them deeply so as the methods
discussed in the proposed systems is needed to combine which
is examined in the proposed system
Achu Anna Antony S1 M.Tech CSE Roll No: 01 Guide: Mr.Bino Thomas Assistant Professor, CSESECURITY ISSUES OF IOT WITH FOG. 10 / 25
RELEVANT SECURITY TECHNOLOGIES
Security technology for IoT network
When client wants to access cloud services, he must go
through authentication process to ensure confidentiality and
security for IoT network.
Authorized users can access cloud with mobile devices.
Protocol is of two phases: Registration and Authentication.
Figure: Authentication as a service
Achu Anna Antony S1 M.Tech CSE Roll No: 01 Guide: Mr.Bino Thomas Assistant Professor, CSESECURITY ISSUES OF IOT WITH FOG. 11 / 25
RELEVANT SECURITY TECHNOLOGIES contd...
Security technology for fog node
In fog Computing, much of the information is gathered into
fog node.
If a wrong information is spread by exploiting vulnerability is a
big problem.
So need dynamic analysis techniques to monitor fog node in
real time
Typically, the performance overhead of dynamic analysis is
high.
Achu Anna Antony S1 M.Tech CSE Roll No: 01 Guide: Mr.Bino Thomas Assistant Professor, CSESECURITY ISSUES OF IOT WITH FOG. 12 / 25
RELEVANT SECURITY TECHNOLOGIES contd...
Security technology for IoT node
When some IoT nodes are out of order or provide wrong
information, it can affect people.
Attacker has many chances to compromise various devices
with sensors.
The attacker is able to predict user behavior and abuse its
information.
Achu Anna Antony S1 M.Tech CSE Roll No: 01 Guide: Mr.Bino Thomas Assistant Professor, CSESECURITY ISSUES OF IOT WITH FOG. 13 / 25
RELEVANT SECURITY TECHNOLOGIES contd...
For IoT nodes, to be truly secure, an IoT node must also
obtain application layer security.
That means that the node itself, and not just the
communication channel (i.e. the pipe), should be
authenticated.
In addition to channel authentication, encryption and data
integrity should be established at the application layer to
protect the data flowing through the pipe.
Achu Anna Antony S1 M.Tech CSE Roll No: 01 Guide: Mr.Bino Thomas Assistant Professor, CSESECURITY ISSUES OF IOT WITH FOG. 14 / 25
SECURITY AND PRIVACY ISSUES IN FOG
COMPUTING
Man- in- the middle Attack
In this attack, gateways serving as fog devices may be
compromised or replaced by fake ones.
Use a strong encryption between the client and the server and
never connect to open WiFi routers directly.
Encryption and decryption methods consume large amount of
battery on mobile device.
Achu Anna Antony S1 M.Tech CSE Roll No: 01 Guide: Mr.Bino Thomas Assistant Professor, CSESECURITY ISSUES OF IOT WITH FOG. 15 / 25
SECURITY AND PRIVACY ISSUES IN FOG
COMPUTING contd...
Intrusion Detection
Intrusion detection system analyzes and monitors
i) access control policy, ii) a log file, and iii)user log
information in order to detect intrusion behavior.
It can be run on network side in order to detect malicious
activity such as DoS, port scanning.
Intrusion detection techniques have been applied to mitigate
attacks such as i) insider attack, ii) flooding attack, iii) port
scanning, iv) attacks on VM or hypervisor.
Achu Anna Antony S1 M.Tech CSE Roll No: 01 Guide: Mr.Bino Thomas Assistant Professor, CSESECURITY ISSUES OF IOT WITH FOG. 16 / 25
SECURITY AND PRIVACY ISSUES IN FOG
COMPUTING contd...
Malicious Fog node problem
In order to provide service to user, fog nodes process data
received from the IoT devices.
If the workloads is heavy, it is divided into several jobs and
processed by several fog nodes.
If some fog nodes are compounded by a malicious user, it is
difficult to ensure the integrity of the data.
Before the computation begin, fog nodes must trust each
other.
An authentication protocol is required.
Achu Anna Antony S1 M.Tech CSE Roll No: 01 Guide: Mr.Bino Thomas Assistant Professor, CSESECURITY ISSUES OF IOT WITH FOG. 17 / 25
SECURITY AND PRIVACY ISSUES IN FOG
COMPUTING contd...
Malicious Detection Technique
When some fog nodes are compromised, hybrid detection
technique is useful to detect malicious code in fog nodes.
It is combined with signature-based detection technique and
behavior-based detection technique.
Achu Anna Antony S1 M.Tech CSE Roll No: 01 Guide: Mr.Bino Thomas Assistant Professor, CSESECURITY ISSUES OF IOT WITH FOG. 18 / 25
SECURITY AND PRIVACY ISSUES IN FOG
COMPUTING contd...
Data Protection
Messages generated from IoT devices is sent to the nearest
fog nodes.
When distributed and processed data is merged, the integrity
of the data should be guaranteed.
Because of limited resources, it is difficult to encrypt or
decrypt data on IoT device so light-weight encryption
algorithms or masking techniques are required.
Achu Anna Antony S1 M.Tech CSE Roll No: 01 Guide: Mr.Bino Thomas Assistant Professor, CSESECURITY ISSUES OF IOT WITH FOG. 19 / 25
SECURITY AND PRIVACY ISSUES IN FOG
COMPUTING contd...
Data Management Issues
Fog nodes are geographically distributed, making it difficult to
know data location.
The user wants to be provided with the same services in other
areas.
It is difficult for user to know whether the node provides the
same service.
Some fog nodes by having duplicated files will cause a waste
of resources.
IoT will create enormous amounts of data there is a need for
distributed intelligence and so-called fast Big Data processing.
Achu Anna Antony S1 M.Tech CSE Roll No: 01 Guide: Mr.Bino Thomas Assistant Professor, CSESECURITY ISSUES OF IOT WITH FOG. 20 / 25
SECURITY AND PRIVACY ISSUES IN FOG
COMPUTING contd...
Every communication deployment of IoT is unique.
However, there are four basic stages that are common to just
about every IoT application. Those components are:
data collection,
data transmission,
data assessment, and
response to the available information.
Successful data management is therefore very important to
the success of IoT.
Achu Anna Antony S1 M.Tech CSE Roll No: 01 Guide: Mr.Bino Thomas Assistant Professor, CSESECURITY ISSUES OF IOT WITH FOG. 21 / 25
CONCLUSION
IoT cloud with fog embedded system can overcome
congestion problem
network latency
Fog computing provides the improved quality of services to
the user by complementing shortages of IoT cloud.
IoT technology can be utilized in various fields in the future.
This presentation highlights the need to configure the secure
fog computing environment through security technologies
Achu Anna Antony S1 M.Tech CSE Roll No: 01 Guide: Mr.Bino Thomas Assistant Professor, CSESECURITY ISSUES OF IOT WITH FOG. 22 / 25
FUTURE WORKS
Future work should be done to develop a system for efficiently
collect and analyze various logs generated in fog computing
environment..
Achu Anna Antony S1 M.Tech CSE Roll No: 01 Guide: Mr.Bino Thomas Assistant Professor, CSESECURITY ISSUES OF IOT WITH FOG. 23 / 25
REFERENCES
[1] Kanghyo Lee , Donghyun Kim, Dongsoo Ha, Ubaidullah Rajput
and Heekuck Oh,”On Security and Privacy Issues of Fog
Computing supported Internet of Things Environment,”Hanyang
University, ERICA Campus, South Korea,2015.
[2] L.M.Vaquero and L.Rodero-Merino,Finding your Way in
Fog:Towards a Comprehensive Definition of Fog Computing, ACM
SIGCOMM Computer Communication Review, vol.44, Oct. 2014.
[3] F.Bonomi, R.Milito, J.Zhu, and S.Addepalli,Fog Computing and
Its Role in the Internet of Things, Proceedings of the first edition
of the MCC workshop on Mobile Cloud Computing,Aug.2012.
[4] I.Stojmenovic and W.Sheng,The Fog Computing Paradigm:
Scenarios and Security Issues, Federated Conference on Computer
Science and Information Systems, pp.1-8, Sept. 2014.
[5] M.Zhang, Y.Duan, H.Yun, and Z.Zhao,Semantics-Aware
Android Malware Classification Using Weighted Contextual API
Dependency Graphs, Proceedings of the 2014 ACM SIGSAC
Conference on Computer and Communications Security, Nov.2014.
Achu Anna Antony S1 M.Tech CSE Roll No: 01 Guide: Mr.Bino Thomas Assistant Professor, CSESECURITY ISSUES OF IOT WITH FOG. 24 / 25
THANK YOU
Achu Anna Antony S1 M.Tech CSE Roll No: 01 Guide: Mr.Bino Thomas Assistant Professor, CSESECURITY ISSUES OF IOT WITH FOG. 25 / 25

Contenu connexe

Tendances

IoT Security Challenges and Solutions
IoT Security Challenges and SolutionsIoT Security Challenges and Solutions
IoT Security Challenges and SolutionsIntel® Software
 
2013 11 mobile eating the world
2013 11 mobile eating the world2013 11 mobile eating the world
2013 11 mobile eating the worldBenedict Evans
 
Cybersecurity in the Era of IoT
Cybersecurity in the Era of IoTCybersecurity in the Era of IoT
Cybersecurity in the Era of IoTAmy Daly
 
Iot Security, Internet of Things
Iot Security, Internet of ThingsIot Security, Internet of Things
Iot Security, Internet of ThingsBryan Len
 
Industry 4.0 - How Disruptive Technology Affects Business Globally - To Disru...
Industry 4.0 - How Disruptive Technology Affects Business Globally - To Disru...Industry 4.0 - How Disruptive Technology Affects Business Globally - To Disru...
Industry 4.0 - How Disruptive Technology Affects Business Globally - To Disru...Dr. Mazlan Abbas
 
Biometrics and Multi-Factor Authentication, The Unleashed Dragon
Biometrics and Multi-Factor Authentication, The Unleashed DragonBiometrics and Multi-Factor Authentication, The Unleashed Dragon
Biometrics and Multi-Factor Authentication, The Unleashed DragonClare Nelson, CISSP, CIPP-E
 
Fog computing ( foggy cloud)
Fog computing  ( foggy cloud)Fog computing  ( foggy cloud)
Fog computing ( foggy cloud)Iffat Anjum
 
Introduction to IoT Security
Introduction to IoT SecurityIntroduction to IoT Security
Introduction to IoT SecurityCAS
 
Data Privacy in the Cloud.pdf
Data Privacy in the Cloud.pdfData Privacy in the Cloud.pdf
Data Privacy in the Cloud.pdfaccacloud
 
Introduction to MQTT
Introduction to MQTTIntroduction to MQTT
Introduction to MQTTEMQ
 

Tendances (20)

IoT Security Challenges and Solutions
IoT Security Challenges and SolutionsIoT Security Challenges and Solutions
IoT Security Challenges and Solutions
 
2013 11 mobile eating the world
2013 11 mobile eating the world2013 11 mobile eating the world
2013 11 mobile eating the world
 
Cybersecurity in the Era of IoT
Cybersecurity in the Era of IoTCybersecurity in the Era of IoT
Cybersecurity in the Era of IoT
 
Iot Security, Internet of Things
Iot Security, Internet of ThingsIot Security, Internet of Things
Iot Security, Internet of Things
 
Fog computing
Fog computingFog computing
Fog computing
 
Fog computing
Fog computingFog computing
Fog computing
 
IoT Security
IoT SecurityIoT Security
IoT Security
 
Industry 4.0 - How Disruptive Technology Affects Business Globally - To Disru...
Industry 4.0 - How Disruptive Technology Affects Business Globally - To Disru...Industry 4.0 - How Disruptive Technology Affects Business Globally - To Disru...
Industry 4.0 - How Disruptive Technology Affects Business Globally - To Disru...
 
Cloud, Fog & Edge Computing
Cloud, Fog & Edge ComputingCloud, Fog & Edge Computing
Cloud, Fog & Edge Computing
 
Biometrics and Multi-Factor Authentication, The Unleashed Dragon
Biometrics and Multi-Factor Authentication, The Unleashed DragonBiometrics and Multi-Factor Authentication, The Unleashed Dragon
Biometrics and Multi-Factor Authentication, The Unleashed Dragon
 
Fog computing in IoT
Fog computing in IoTFog computing in IoT
Fog computing in IoT
 
Fog computing
Fog computingFog computing
Fog computing
 
Fog computing ( foggy cloud)
Fog computing  ( foggy cloud)Fog computing  ( foggy cloud)
Fog computing ( foggy cloud)
 
Introduction to IoT Security
Introduction to IoT SecurityIntroduction to IoT Security
Introduction to IoT Security
 
Data Privacy in the Cloud.pdf
Data Privacy in the Cloud.pdfData Privacy in the Cloud.pdf
Data Privacy in the Cloud.pdf
 
IoT/M2M Security
IoT/M2M SecurityIoT/M2M Security
IoT/M2M Security
 
Bluejacking ppt
Bluejacking pptBluejacking ppt
Bluejacking ppt
 
Internet of Things presentation
Internet of Things presentationInternet of Things presentation
Internet of Things presentation
 
security and privacy-Internet of things
security and privacy-Internet of thingssecurity and privacy-Internet of things
security and privacy-Internet of things
 
Introduction to MQTT
Introduction to MQTTIntroduction to MQTT
Introduction to MQTT
 

En vedette

cloud security using Fog Computing
cloud security using Fog Computingcloud security using Fog Computing
cloud security using Fog Computingarchana lisbon
 
Fog computing
Fog computingFog computing
Fog computingAnkit_ap
 
Fog Computing with VORTEX
Fog Computing with VORTEXFog Computing with VORTEX
Fog Computing with VORTEXAngelo Corsaro
 
fog computing provide security to the data in cloud
fog computing provide security to the data in cloudfog computing provide security to the data in cloud
fog computing provide security to the data in cloudpriyanka reddy
 
What is fog computing
What is fog computingWhat is fog computing
What is fog computingAhmed Banafa
 
Fog computing technology
Fog computing technologyFog computing technology
Fog computing technologyNikhil Sabu
 
Internet of Things (IOT) - Technology and Applications
Internet of Things (IOT) - Technology and ApplicationsInternet of Things (IOT) - Technology and Applications
Internet of Things (IOT) - Technology and ApplicationsDr. Mazlan Abbas
 
IoT Security: Problems, Challenges and Solutions
IoT Security: Problems, Challenges and SolutionsIoT Security: Problems, Challenges and Solutions
IoT Security: Problems, Challenges and SolutionsLiwei Ren任力偉
 
fog computing ppt
fog computing ppt fog computing ppt
fog computing ppt sravya raju
 
What is the Internet of Things?
What is the Internet of Things?What is the Internet of Things?
What is the Internet of Things?Felix Grovit
 
Security in the Internet of Things
Security in the Internet of ThingsSecurity in the Internet of Things
Security in the Internet of ThingsForgeRock
 
What exactly is the "Internet of Things"?
What exactly is the "Internet of Things"?What exactly is the "Internet of Things"?
What exactly is the "Internet of Things"?Dr. Mazlan Abbas
 
Internet of Things and its applications
Internet of Things and its applicationsInternet of Things and its applications
Internet of Things and its applicationsPasquale Puzio
 
Internet of Things (IoT) - We Are at the Tip of An Iceberg
Internet of Things (IoT) - We Are at the Tip of An IcebergInternet of Things (IoT) - We Are at the Tip of An Iceberg
Internet of Things (IoT) - We Are at the Tip of An IcebergDr. Mazlan Abbas
 
Internet-of-things- (IOT) - a-seminar - ppt - by- mohan-kumar-g
Internet-of-things- (IOT) - a-seminar - ppt - by- mohan-kumar-gInternet-of-things- (IOT) - a-seminar - ppt - by- mohan-kumar-g
Internet-of-things- (IOT) - a-seminar - ppt - by- mohan-kumar-gMohan Kumar G
 

En vedette (17)

cloud security using Fog Computing
cloud security using Fog Computingcloud security using Fog Computing
cloud security using Fog Computing
 
Fog computing
Fog computingFog computing
Fog computing
 
Face detection issues
Face detection issuesFace detection issues
Face detection issues
 
Fog Computing with VORTEX
Fog Computing with VORTEXFog Computing with VORTEX
Fog Computing with VORTEX
 
Latest Thesis Topics for Fog computing
Latest Thesis Topics for Fog computingLatest Thesis Topics for Fog computing
Latest Thesis Topics for Fog computing
 
fog computing provide security to the data in cloud
fog computing provide security to the data in cloudfog computing provide security to the data in cloud
fog computing provide security to the data in cloud
 
What is fog computing
What is fog computingWhat is fog computing
What is fog computing
 
Fog computing technology
Fog computing technologyFog computing technology
Fog computing technology
 
Internet of Things (IOT) - Technology and Applications
Internet of Things (IOT) - Technology and ApplicationsInternet of Things (IOT) - Technology and Applications
Internet of Things (IOT) - Technology and Applications
 
IoT Security: Problems, Challenges and Solutions
IoT Security: Problems, Challenges and SolutionsIoT Security: Problems, Challenges and Solutions
IoT Security: Problems, Challenges and Solutions
 
fog computing ppt
fog computing ppt fog computing ppt
fog computing ppt
 
What is the Internet of Things?
What is the Internet of Things?What is the Internet of Things?
What is the Internet of Things?
 
Security in the Internet of Things
Security in the Internet of ThingsSecurity in the Internet of Things
Security in the Internet of Things
 
What exactly is the "Internet of Things"?
What exactly is the "Internet of Things"?What exactly is the "Internet of Things"?
What exactly is the "Internet of Things"?
 
Internet of Things and its applications
Internet of Things and its applicationsInternet of Things and its applications
Internet of Things and its applications
 
Internet of Things (IoT) - We Are at the Tip of An Iceberg
Internet of Things (IoT) - We Are at the Tip of An IcebergInternet of Things (IoT) - We Are at the Tip of An Iceberg
Internet of Things (IoT) - We Are at the Tip of An Iceberg
 
Internet-of-things- (IOT) - a-seminar - ppt - by- mohan-kumar-g
Internet-of-things- (IOT) - a-seminar - ppt - by- mohan-kumar-gInternet-of-things- (IOT) - a-seminar - ppt - by- mohan-kumar-g
Internet-of-things- (IOT) - a-seminar - ppt - by- mohan-kumar-g
 

Similaire à Security Issues of IoT with Fog

SAM-IoT: Securing low power device communication in critical infrastructure m...
SAM-IoT: Securing low power device communication in critical infrastructure m...SAM-IoT: Securing low power device communication in critical infrastructure m...
SAM-IoT: Securing low power device communication in critical infrastructure m...Brain IoT Project
 
Security and Privacy Issues in IoT Environment
Security and Privacy Issues in IoT EnvironmentSecurity and Privacy Issues in IoT Environment
Security and Privacy Issues in IoT EnvironmentDr. Amarjeet Singh
 
509286-Aki_Koivu-Review
509286-Aki_Koivu-Review509286-Aki_Koivu-Review
509286-Aki_Koivu-ReviewAki Koivu
 
Internet of Things IoT Security Perspective
Internet of Things IoT Security PerspectiveInternet of Things IoT Security Perspective
Internet of Things IoT Security Perspectiveijtsrd
 
Internet & iot security
Internet & iot securityInternet & iot security
Internet & iot securityUsman Anjum
 
A Novel Security Approach for Communication using IOT
A Novel Security Approach for Communication using IOTA Novel Security Approach for Communication using IOT
A Novel Security Approach for Communication using IOTIJEACS
 
IRJET - A Study on Smart Way for Securing IoT Devices
IRJET -  	  A Study on Smart Way for Securing IoT DevicesIRJET -  	  A Study on Smart Way for Securing IoT Devices
IRJET - A Study on Smart Way for Securing IoT DevicesIRJET Journal
 
INTERNET OF THINGS A STUDY ON SECURITY AND PRIVACY THREATSMd .docx
INTERNET OF THINGS A STUDY ON SECURITY AND PRIVACY THREATSMd .docxINTERNET OF THINGS A STUDY ON SECURITY AND PRIVACY THREATSMd .docx
INTERNET OF THINGS A STUDY ON SECURITY AND PRIVACY THREATSMd .docxvrickens
 
A Survey Report on : Security & Challenges in Internet of Things
A Survey Report on : Security & Challenges in Internet of ThingsA Survey Report on : Security & Challenges in Internet of Things
A Survey Report on : Security & Challenges in Internet of Thingsijsrd.com
 
Security Aspects in IoT - A Review
Security Aspects in IoT - A Review Security Aspects in IoT - A Review
Security Aspects in IoT - A Review Asiri Hewage
 
LConey-Journal_of_Physical_Security-Article_The-Ability-to-Defend-Against-the...
LConey-Journal_of_Physical_Security-Article_The-Ability-to-Defend-Against-the...LConey-Journal_of_Physical_Security-Article_The-Ability-to-Defend-Against-the...
LConey-Journal_of_Physical_Security-Article_The-Ability-to-Defend-Against-the...Lillie Coney
 
Security in IoT
Security in IoTSecurity in IoT
Security in IoTSKS
 
The internet of things (io t) : IoT academy
The internet of things (io t) : IoT academy The internet of things (io t) : IoT academy
The internet of things (io t) : IoT academy AnkitThakkar46
 
The internet of things (io t)
The internet of things (io t)The internet of things (io t)
The internet of things (io t)shashankvaidyar2
 
Design of a Hybrid Authentication Technique for User and Device Authenticatio...
Design of a Hybrid Authentication Technique for User and Device Authenticatio...Design of a Hybrid Authentication Technique for User and Device Authenticatio...
Design of a Hybrid Authentication Technique for User and Device Authenticatio...IRJET Journal
 
FOG COMPUTING- Presentation
FOG COMPUTING- Presentation FOG COMPUTING- Presentation
FOG COMPUTING- Presentation Anjana Shivangi
 
Unauthorized Access Detection in IoT using Canary Token Algorithm
Unauthorized Access Detection in IoT using Canary Token AlgorithmUnauthorized Access Detection in IoT using Canary Token Algorithm
Unauthorized Access Detection in IoT using Canary Token AlgorithmIJSRED
 
Bis-221 Introduction To Computer Applications And Systems...
Bis-221 Introduction To Computer Applications And Systems...Bis-221 Introduction To Computer Applications And Systems...
Bis-221 Introduction To Computer Applications And Systems...Rachel Johnston
 
IoT security presented in Ada's List Conference
IoT security presented in Ada's List ConferenceIoT security presented in Ada's List Conference
IoT security presented in Ada's List ConferenceCigdem Sengul
 
76 s201913
76 s20191376 s201913
76 s201913IJRAT
 

Similaire à Security Issues of IoT with Fog (20)

SAM-IoT: Securing low power device communication in critical infrastructure m...
SAM-IoT: Securing low power device communication in critical infrastructure m...SAM-IoT: Securing low power device communication in critical infrastructure m...
SAM-IoT: Securing low power device communication in critical infrastructure m...
 
Security and Privacy Issues in IoT Environment
Security and Privacy Issues in IoT EnvironmentSecurity and Privacy Issues in IoT Environment
Security and Privacy Issues in IoT Environment
 
509286-Aki_Koivu-Review
509286-Aki_Koivu-Review509286-Aki_Koivu-Review
509286-Aki_Koivu-Review
 
Internet of Things IoT Security Perspective
Internet of Things IoT Security PerspectiveInternet of Things IoT Security Perspective
Internet of Things IoT Security Perspective
 
Internet & iot security
Internet & iot securityInternet & iot security
Internet & iot security
 
A Novel Security Approach for Communication using IOT
A Novel Security Approach for Communication using IOTA Novel Security Approach for Communication using IOT
A Novel Security Approach for Communication using IOT
 
IRJET - A Study on Smart Way for Securing IoT Devices
IRJET -  	  A Study on Smart Way for Securing IoT DevicesIRJET -  	  A Study on Smart Way for Securing IoT Devices
IRJET - A Study on Smart Way for Securing IoT Devices
 
INTERNET OF THINGS A STUDY ON SECURITY AND PRIVACY THREATSMd .docx
INTERNET OF THINGS A STUDY ON SECURITY AND PRIVACY THREATSMd .docxINTERNET OF THINGS A STUDY ON SECURITY AND PRIVACY THREATSMd .docx
INTERNET OF THINGS A STUDY ON SECURITY AND PRIVACY THREATSMd .docx
 
A Survey Report on : Security & Challenges in Internet of Things
A Survey Report on : Security & Challenges in Internet of ThingsA Survey Report on : Security & Challenges in Internet of Things
A Survey Report on : Security & Challenges in Internet of Things
 
Security Aspects in IoT - A Review
Security Aspects in IoT - A Review Security Aspects in IoT - A Review
Security Aspects in IoT - A Review
 
LConey-Journal_of_Physical_Security-Article_The-Ability-to-Defend-Against-the...
LConey-Journal_of_Physical_Security-Article_The-Ability-to-Defend-Against-the...LConey-Journal_of_Physical_Security-Article_The-Ability-to-Defend-Against-the...
LConey-Journal_of_Physical_Security-Article_The-Ability-to-Defend-Against-the...
 
Security in IoT
Security in IoTSecurity in IoT
Security in IoT
 
The internet of things (io t) : IoT academy
The internet of things (io t) : IoT academy The internet of things (io t) : IoT academy
The internet of things (io t) : IoT academy
 
The internet of things (io t)
The internet of things (io t)The internet of things (io t)
The internet of things (io t)
 
Design of a Hybrid Authentication Technique for User and Device Authenticatio...
Design of a Hybrid Authentication Technique for User and Device Authenticatio...Design of a Hybrid Authentication Technique for User and Device Authenticatio...
Design of a Hybrid Authentication Technique for User and Device Authenticatio...
 
FOG COMPUTING- Presentation
FOG COMPUTING- Presentation FOG COMPUTING- Presentation
FOG COMPUTING- Presentation
 
Unauthorized Access Detection in IoT using Canary Token Algorithm
Unauthorized Access Detection in IoT using Canary Token AlgorithmUnauthorized Access Detection in IoT using Canary Token Algorithm
Unauthorized Access Detection in IoT using Canary Token Algorithm
 
Bis-221 Introduction To Computer Applications And Systems...
Bis-221 Introduction To Computer Applications And Systems...Bis-221 Introduction To Computer Applications And Systems...
Bis-221 Introduction To Computer Applications And Systems...
 
IoT security presented in Ada's List Conference
IoT security presented in Ada's List ConferenceIoT security presented in Ada's List Conference
IoT security presented in Ada's List Conference
 
76 s201913
76 s20191376 s201913
76 s201913
 

Dernier

Check out the Free Landing Page Hosting in 2024
Check out the Free Landing Page Hosting in 2024Check out the Free Landing Page Hosting in 2024
Check out the Free Landing Page Hosting in 2024Shubham Pant
 
Bio Medical Waste Management Guideliness 2023 ppt.pptx
Bio Medical Waste Management Guideliness 2023 ppt.pptxBio Medical Waste Management Guideliness 2023 ppt.pptx
Bio Medical Waste Management Guideliness 2023 ppt.pptxnaveenithkrishnan
 
TYPES AND DEFINITION OF ONLINE CRIMES AND HAZARDS
TYPES AND DEFINITION OF ONLINE CRIMES AND HAZARDSTYPES AND DEFINITION OF ONLINE CRIMES AND HAZARDS
TYPES AND DEFINITION OF ONLINE CRIMES AND HAZARDSedrianrheine
 
LESSON 10/ GROUP 10/ ST. THOMAS AQUINASS
LESSON 10/ GROUP 10/ ST. THOMAS AQUINASSLESSON 10/ GROUP 10/ ST. THOMAS AQUINASS
LESSON 10/ GROUP 10/ ST. THOMAS AQUINASSlesteraporado16
 
WordPress by the numbers - Jan Loeffler, CTO WebPros, CloudFest 2024
WordPress by the numbers - Jan Loeffler, CTO WebPros, CloudFest 2024WordPress by the numbers - Jan Loeffler, CTO WebPros, CloudFest 2024
WordPress by the numbers - Jan Loeffler, CTO WebPros, CloudFest 2024Jan Löffler
 
Computer 10 Lesson 8: Building a Website
Computer 10 Lesson 8: Building a WebsiteComputer 10 Lesson 8: Building a Website
Computer 10 Lesson 8: Building a WebsiteMavein
 
Zero-day Vulnerabilities
Zero-day VulnerabilitiesZero-day Vulnerabilities
Zero-day Vulnerabilitiesalihassaah1994
 
Introduction to ICANN and Fellowship program by Shreedeep Rayamajhi.pdf
Introduction to ICANN and Fellowship program  by Shreedeep Rayamajhi.pdfIntroduction to ICANN and Fellowship program  by Shreedeep Rayamajhi.pdf
Introduction to ICANN and Fellowship program by Shreedeep Rayamajhi.pdfShreedeep Rayamajhi
 
LESSON 5 GROUP 10 ST. THOMAS AQUINAS.pdf
LESSON 5 GROUP 10 ST. THOMAS AQUINAS.pdfLESSON 5 GROUP 10 ST. THOMAS AQUINAS.pdf
LESSON 5 GROUP 10 ST. THOMAS AQUINAS.pdfmchristianalwyn
 
Vision Forward: Tracing Image Search SEO From Its Roots To AI-Enhanced Horizons
Vision Forward: Tracing Image Search SEO From Its Roots To AI-Enhanced HorizonsVision Forward: Tracing Image Search SEO From Its Roots To AI-Enhanced Horizons
Vision Forward: Tracing Image Search SEO From Its Roots To AI-Enhanced HorizonsRoxana Stingu
 
Benefits of doing Internet peering and running an Internet Exchange (IX) pres...
Benefits of doing Internet peering and running an Internet Exchange (IX) pres...Benefits of doing Internet peering and running an Internet Exchange (IX) pres...
Benefits of doing Internet peering and running an Internet Exchange (IX) pres...APNIC
 
Presentation2.pptx - JoyPress Wordpress
Presentation2.pptx -  JoyPress WordpressPresentation2.pptx -  JoyPress Wordpress
Presentation2.pptx - JoyPress Wordpressssuser166378
 

Dernier (12)

Check out the Free Landing Page Hosting in 2024
Check out the Free Landing Page Hosting in 2024Check out the Free Landing Page Hosting in 2024
Check out the Free Landing Page Hosting in 2024
 
Bio Medical Waste Management Guideliness 2023 ppt.pptx
Bio Medical Waste Management Guideliness 2023 ppt.pptxBio Medical Waste Management Guideliness 2023 ppt.pptx
Bio Medical Waste Management Guideliness 2023 ppt.pptx
 
TYPES AND DEFINITION OF ONLINE CRIMES AND HAZARDS
TYPES AND DEFINITION OF ONLINE CRIMES AND HAZARDSTYPES AND DEFINITION OF ONLINE CRIMES AND HAZARDS
TYPES AND DEFINITION OF ONLINE CRIMES AND HAZARDS
 
LESSON 10/ GROUP 10/ ST. THOMAS AQUINASS
LESSON 10/ GROUP 10/ ST. THOMAS AQUINASSLESSON 10/ GROUP 10/ ST. THOMAS AQUINASS
LESSON 10/ GROUP 10/ ST. THOMAS AQUINASS
 
WordPress by the numbers - Jan Loeffler, CTO WebPros, CloudFest 2024
WordPress by the numbers - Jan Loeffler, CTO WebPros, CloudFest 2024WordPress by the numbers - Jan Loeffler, CTO WebPros, CloudFest 2024
WordPress by the numbers - Jan Loeffler, CTO WebPros, CloudFest 2024
 
Computer 10 Lesson 8: Building a Website
Computer 10 Lesson 8: Building a WebsiteComputer 10 Lesson 8: Building a Website
Computer 10 Lesson 8: Building a Website
 
Zero-day Vulnerabilities
Zero-day VulnerabilitiesZero-day Vulnerabilities
Zero-day Vulnerabilities
 
Introduction to ICANN and Fellowship program by Shreedeep Rayamajhi.pdf
Introduction to ICANN and Fellowship program  by Shreedeep Rayamajhi.pdfIntroduction to ICANN and Fellowship program  by Shreedeep Rayamajhi.pdf
Introduction to ICANN and Fellowship program by Shreedeep Rayamajhi.pdf
 
LESSON 5 GROUP 10 ST. THOMAS AQUINAS.pdf
LESSON 5 GROUP 10 ST. THOMAS AQUINAS.pdfLESSON 5 GROUP 10 ST. THOMAS AQUINAS.pdf
LESSON 5 GROUP 10 ST. THOMAS AQUINAS.pdf
 
Vision Forward: Tracing Image Search SEO From Its Roots To AI-Enhanced Horizons
Vision Forward: Tracing Image Search SEO From Its Roots To AI-Enhanced HorizonsVision Forward: Tracing Image Search SEO From Its Roots To AI-Enhanced Horizons
Vision Forward: Tracing Image Search SEO From Its Roots To AI-Enhanced Horizons
 
Benefits of doing Internet peering and running an Internet Exchange (IX) pres...
Benefits of doing Internet peering and running an Internet Exchange (IX) pres...Benefits of doing Internet peering and running an Internet Exchange (IX) pres...
Benefits of doing Internet peering and running an Internet Exchange (IX) pres...
 
Presentation2.pptx - JoyPress Wordpress
Presentation2.pptx -  JoyPress WordpressPresentation2.pptx -  JoyPress Wordpress
Presentation2.pptx - JoyPress Wordpress
 

Security Issues of IoT with Fog

  • 1. SECURITY ISSUES OF IOT WITH FOG. Achu Anna Antony S1 M.Tech CSE Roll No: 01 Guide: Mr.Bino Thomas Assistant Professor, CSE November 9, 2016 Achu Anna Antony S1 M.Tech CSE Roll No: 01 Guide: Mr.Bino Thomas Assistant Professor, CSESECURITY ISSUES OF IOT WITH FOG. 1 / 25
  • 2. OUTLINE Introduction Existing System Problem Statement Proposed System Conclusion Future Works References Achu Anna Antony S1 M.Tech CSE Roll No: 01 Guide: Mr.Bino Thomas Assistant Professor, CSESECURITY ISSUES OF IOT WITH FOG. 2 / 25
  • 3. INTRODUCTION Cloud: Storing and accessing data and programs over the Internet instead of computer’s hard drive. IoT : Everyday objects(IoT nodes) connected through Internet, allowing them to send and receive data IoT uses: Internet : Infrastructure to interconnect IoT nodes Cloud: Background supporting infrastructure Achu Anna Antony S1 M.Tech CSE Roll No: 01 Guide: Mr.Bino Thomas Assistant Professor, CSESECURITY ISSUES OF IOT WITH FOG. 3 / 25
  • 4. INTRODUCTION contd... Huge network latency and Backend overhead occurs as data to be processed increases in IoT cloud. So IoT uses, Fog as a solution : ie.. intermediate computing buffer between IoT nodes and Cloud Adoption of IoT fog can cause many security threats, which is explored throughout Achu Anna Antony S1 M.Tech CSE Roll No: 01 Guide: Mr.Bino Thomas Assistant Professor, CSESECURITY ISSUES OF IOT WITH FOG. 4 / 25
  • 5. EXISTING SYSTEM Title:- ”Fog Computing and Its Role in the Internet of Things” (F.Bonomi, R. Milito, J. Zhu, and S. Addepalli) Proposed: Fog Computing - Extension of cloud computing Features used Features: Highly virtualized platform Limitations Multi fog OS prevents from access of other OS. If there occur any problem on Kernel mode, it does not prevent. Figure: Fog with computing features Achu Anna Antony S1 M.Tech CSE Roll No: 01 Guide: Mr.Bino Thomas Assistant Professor, CSESECURITY ISSUES OF IOT WITH FOG. 5 / 25
  • 6. EXISTING SYSTEM contd... Title:-”The Fog Computing Paradigm: Scenarios and Security Issues” (I. Stojmenovic and W. Sheng) Proposed: Man in the middle attack- Fog devices get replaced by fake ones. Features: Intrusion Detection method signature, behavioural or anomaly based detection method Limitations Protection methods like encryption and decryption of data consume large amount of battery on mobile devices. Achu Anna Antony S1 M.Tech CSE Roll No: 01 Guide: Mr.Bino Thomas Assistant Professor, CSESECURITY ISSUES OF IOT WITH FOG. 6 / 25
  • 7. EXISTING SYSTEM contd... Title:- Semantics-Aware Android Malware Classification Using Weighted Contextual API Dependency Graphs (M. Zhang, Y. Duan, H. Yun, and Z.Zhao) Proposed: Android based malware detection Features: Uses Signature based approach for detection of malware Graphs are generated from behaviour graphs and convert it to signature and stores in database. Limitations Detection of malware from unknown or new malware family will be hectic. Figure: Android based malware to signature conversion[4] Achu Anna Antony S1 M.Tech CSE Roll No: 01 Guide: Mr.Bino Thomas Assistant Professor, CSESECURITY ISSUES OF IOT WITH FOG. 7 / 25
  • 8. FOG COMPUTING Fog computing is an extension of cloud computing paradigm, but is a more highly virtualized platform that provides computation, storage, and networking services between end IoT devices and back-end cloud servers. Figure: The hierarchical fog computing architecture Achu Anna Antony S1 M.Tech CSE Roll No: 01 Guide: Mr.Bino Thomas Assistant Professor, CSESECURITY ISSUES OF IOT WITH FOG. 8 / 25
  • 9. ADVANTAGES AND APPLICATIONS OF FOG Advantages Greater business agility Low latency Geo distribution Lower operating expense Applications Geographically distributed applications Fast mobile applications Large-scale distributed control systems Achu Anna Antony S1 M.Tech CSE Roll No: 01 Guide: Mr.Bino Thomas Assistant Professor, CSESECURITY ISSUES OF IOT WITH FOG. 9 / 25
  • 10. PROBLEM STATEMENT As fog infrastructure is prone to many security threats, there is a need for studying about them deeply so as the methods discussed in the proposed systems is needed to combine which is examined in the proposed system Achu Anna Antony S1 M.Tech CSE Roll No: 01 Guide: Mr.Bino Thomas Assistant Professor, CSESECURITY ISSUES OF IOT WITH FOG. 10 / 25
  • 11. RELEVANT SECURITY TECHNOLOGIES Security technology for IoT network When client wants to access cloud services, he must go through authentication process to ensure confidentiality and security for IoT network. Authorized users can access cloud with mobile devices. Protocol is of two phases: Registration and Authentication. Figure: Authentication as a service Achu Anna Antony S1 M.Tech CSE Roll No: 01 Guide: Mr.Bino Thomas Assistant Professor, CSESECURITY ISSUES OF IOT WITH FOG. 11 / 25
  • 12. RELEVANT SECURITY TECHNOLOGIES contd... Security technology for fog node In fog Computing, much of the information is gathered into fog node. If a wrong information is spread by exploiting vulnerability is a big problem. So need dynamic analysis techniques to monitor fog node in real time Typically, the performance overhead of dynamic analysis is high. Achu Anna Antony S1 M.Tech CSE Roll No: 01 Guide: Mr.Bino Thomas Assistant Professor, CSESECURITY ISSUES OF IOT WITH FOG. 12 / 25
  • 13. RELEVANT SECURITY TECHNOLOGIES contd... Security technology for IoT node When some IoT nodes are out of order or provide wrong information, it can affect people. Attacker has many chances to compromise various devices with sensors. The attacker is able to predict user behavior and abuse its information. Achu Anna Antony S1 M.Tech CSE Roll No: 01 Guide: Mr.Bino Thomas Assistant Professor, CSESECURITY ISSUES OF IOT WITH FOG. 13 / 25
  • 14. RELEVANT SECURITY TECHNOLOGIES contd... For IoT nodes, to be truly secure, an IoT node must also obtain application layer security. That means that the node itself, and not just the communication channel (i.e. the pipe), should be authenticated. In addition to channel authentication, encryption and data integrity should be established at the application layer to protect the data flowing through the pipe. Achu Anna Antony S1 M.Tech CSE Roll No: 01 Guide: Mr.Bino Thomas Assistant Professor, CSESECURITY ISSUES OF IOT WITH FOG. 14 / 25
  • 15. SECURITY AND PRIVACY ISSUES IN FOG COMPUTING Man- in- the middle Attack In this attack, gateways serving as fog devices may be compromised or replaced by fake ones. Use a strong encryption between the client and the server and never connect to open WiFi routers directly. Encryption and decryption methods consume large amount of battery on mobile device. Achu Anna Antony S1 M.Tech CSE Roll No: 01 Guide: Mr.Bino Thomas Assistant Professor, CSESECURITY ISSUES OF IOT WITH FOG. 15 / 25
  • 16. SECURITY AND PRIVACY ISSUES IN FOG COMPUTING contd... Intrusion Detection Intrusion detection system analyzes and monitors i) access control policy, ii) a log file, and iii)user log information in order to detect intrusion behavior. It can be run on network side in order to detect malicious activity such as DoS, port scanning. Intrusion detection techniques have been applied to mitigate attacks such as i) insider attack, ii) flooding attack, iii) port scanning, iv) attacks on VM or hypervisor. Achu Anna Antony S1 M.Tech CSE Roll No: 01 Guide: Mr.Bino Thomas Assistant Professor, CSESECURITY ISSUES OF IOT WITH FOG. 16 / 25
  • 17. SECURITY AND PRIVACY ISSUES IN FOG COMPUTING contd... Malicious Fog node problem In order to provide service to user, fog nodes process data received from the IoT devices. If the workloads is heavy, it is divided into several jobs and processed by several fog nodes. If some fog nodes are compounded by a malicious user, it is difficult to ensure the integrity of the data. Before the computation begin, fog nodes must trust each other. An authentication protocol is required. Achu Anna Antony S1 M.Tech CSE Roll No: 01 Guide: Mr.Bino Thomas Assistant Professor, CSESECURITY ISSUES OF IOT WITH FOG. 17 / 25
  • 18. SECURITY AND PRIVACY ISSUES IN FOG COMPUTING contd... Malicious Detection Technique When some fog nodes are compromised, hybrid detection technique is useful to detect malicious code in fog nodes. It is combined with signature-based detection technique and behavior-based detection technique. Achu Anna Antony S1 M.Tech CSE Roll No: 01 Guide: Mr.Bino Thomas Assistant Professor, CSESECURITY ISSUES OF IOT WITH FOG. 18 / 25
  • 19. SECURITY AND PRIVACY ISSUES IN FOG COMPUTING contd... Data Protection Messages generated from IoT devices is sent to the nearest fog nodes. When distributed and processed data is merged, the integrity of the data should be guaranteed. Because of limited resources, it is difficult to encrypt or decrypt data on IoT device so light-weight encryption algorithms or masking techniques are required. Achu Anna Antony S1 M.Tech CSE Roll No: 01 Guide: Mr.Bino Thomas Assistant Professor, CSESECURITY ISSUES OF IOT WITH FOG. 19 / 25
  • 20. SECURITY AND PRIVACY ISSUES IN FOG COMPUTING contd... Data Management Issues Fog nodes are geographically distributed, making it difficult to know data location. The user wants to be provided with the same services in other areas. It is difficult for user to know whether the node provides the same service. Some fog nodes by having duplicated files will cause a waste of resources. IoT will create enormous amounts of data there is a need for distributed intelligence and so-called fast Big Data processing. Achu Anna Antony S1 M.Tech CSE Roll No: 01 Guide: Mr.Bino Thomas Assistant Professor, CSESECURITY ISSUES OF IOT WITH FOG. 20 / 25
  • 21. SECURITY AND PRIVACY ISSUES IN FOG COMPUTING contd... Every communication deployment of IoT is unique. However, there are four basic stages that are common to just about every IoT application. Those components are: data collection, data transmission, data assessment, and response to the available information. Successful data management is therefore very important to the success of IoT. Achu Anna Antony S1 M.Tech CSE Roll No: 01 Guide: Mr.Bino Thomas Assistant Professor, CSESECURITY ISSUES OF IOT WITH FOG. 21 / 25
  • 22. CONCLUSION IoT cloud with fog embedded system can overcome congestion problem network latency Fog computing provides the improved quality of services to the user by complementing shortages of IoT cloud. IoT technology can be utilized in various fields in the future. This presentation highlights the need to configure the secure fog computing environment through security technologies Achu Anna Antony S1 M.Tech CSE Roll No: 01 Guide: Mr.Bino Thomas Assistant Professor, CSESECURITY ISSUES OF IOT WITH FOG. 22 / 25
  • 23. FUTURE WORKS Future work should be done to develop a system for efficiently collect and analyze various logs generated in fog computing environment.. Achu Anna Antony S1 M.Tech CSE Roll No: 01 Guide: Mr.Bino Thomas Assistant Professor, CSESECURITY ISSUES OF IOT WITH FOG. 23 / 25
  • 24. REFERENCES [1] Kanghyo Lee , Donghyun Kim, Dongsoo Ha, Ubaidullah Rajput and Heekuck Oh,”On Security and Privacy Issues of Fog Computing supported Internet of Things Environment,”Hanyang University, ERICA Campus, South Korea,2015. [2] L.M.Vaquero and L.Rodero-Merino,Finding your Way in Fog:Towards a Comprehensive Definition of Fog Computing, ACM SIGCOMM Computer Communication Review, vol.44, Oct. 2014. [3] F.Bonomi, R.Milito, J.Zhu, and S.Addepalli,Fog Computing and Its Role in the Internet of Things, Proceedings of the first edition of the MCC workshop on Mobile Cloud Computing,Aug.2012. [4] I.Stojmenovic and W.Sheng,The Fog Computing Paradigm: Scenarios and Security Issues, Federated Conference on Computer Science and Information Systems, pp.1-8, Sept. 2014. [5] M.Zhang, Y.Duan, H.Yun, and Z.Zhao,Semantics-Aware Android Malware Classification Using Weighted Contextual API Dependency Graphs, Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, Nov.2014. Achu Anna Antony S1 M.Tech CSE Roll No: 01 Guide: Mr.Bino Thomas Assistant Professor, CSESECURITY ISSUES OF IOT WITH FOG. 24 / 25
  • 25. THANK YOU Achu Anna Antony S1 M.Tech CSE Roll No: 01 Guide: Mr.Bino Thomas Assistant Professor, CSESECURITY ISSUES OF IOT WITH FOG. 25 / 25